Hardware and Embedded Security in The Context of Internet of Things
Hardware and Embedded Security in The Context of Internet of Things
Internet of Things
ABSTRACT It will allow for new applications that tackle societal chal-
Internet of Things (IoT) is the interconnection of a large lenges by using unprecedented access to data. For instance,
number of resource-constrained devices such as sensors, ac- vehicular collisions, which kill thirty thousand people in the
tuators, and nodes that generate large volumes of data which US annually and injure almost a million more, may be tack-
are then processed into useful actions in areas such as home led by using embedded wireless sensors, monitors, and ac-
and building automation, intelligent transportation and con- tuators in automobiles. IoT will make it possible for emer-
nected vehicles, industrial automation, smart healthcare, gency workers to increase their effectiveness during disaster
smart cities, and others. Important challenges remain to ful- response by connecting to networks of robots. IoT is antic-
fill the IoT vision including data provenance and integrity, ipated to play a critical role in future megacities that are
trust management, identity management, and privacy. We instrumented with a myriad of sensors.
describe how embedded and hardware security approaches Security and privacy are key challenges to make the IoT
can be the basis to address these security challenges. a reality. They cannot be dealt with in an ad-hoc man-
ner using reactive approaches. A proactive approach is re-
quired, where trustworthiness is engineered upfront into IoT.
Categories and Subject Descriptors IoT must have strong security foundations built on a holis-
B.4 [Hardware]: Input/output data communications; C.3 tic view of security for all IoT components. Measures to
[Computer Systems Organization]: Special-purpose and address the realistic challenges of data provenance and in-
application-based systems tegrity, identity management, trust management, and pri-
vacy must be implemented. Absent strong security founda-
tions, attacks on and malfunctions in the IoT components
Keywords will outweigh any of its benefits.
Internet of Things, Security Architecture, Secure IoT Data provenance and integrity, identity management, trust
management, and privacy are four key challenges in design-
ing a secure IoT. Data provenance ensures that the source of
1. INTRODUCTION data is trustworthy. Data integrity ensures that the data has
The way our society interacts with technology is rapidly not been maliciously tampered with. Trust management en-
heading towards a major paradigm shift. Computing is be- sures trust in the devices. Identity management refers to the
coming centered on the vast amounts of data and informa- administration of individual identities. Privacy is essential
tion captured and made accessible as all humans and devices to ensure that the user’s data and credentials are under his
get connected into an Internet of Things (IoT) [8, 1]. IoT is control and no one else’s. Embedded and hardware security
an interconnection of a large number of networked devices. approaches can be leveraged to build a secure IoT. We focus
The interaction between smart machines and the environ- on securing the resource-constrained embedded devices (the
ment results in the generation of large volumes of data that sensors that collect the information, the nodes that process
may be processed into useful commands to control actuators. this information, and the actuators that perform the physi-
IoT will encompass medical implants, alarm clocks, wearable cal action). First we propose to integrate sensing with PUF
systems, automobiles, washing machines, traffic lights, and technology [13] for data provenance and integrity. Second,
the energy grid. It is expected that 50 billion devices will be we propose to use PUFs for identity management. Third,
interconnected by 2020, and this number is further expected we propose to use hardware performance counters [17] for
to reach a trillion [9]. trust management and to monitor the integrity of applica-
tions. Finally, we propose to use lightweight cryptography
Permission to make digital or hard copies of all or part of this work for personal or
to provide privacy.
classroom use is granted without fee provided that copies are not made or distributed The rest of the paper is outlined as follows. A generic IoT
for profit or commercial advantage and that copies bear this notice and the full cita- architecture and its threat model are described in Section
tion on the first page. Copyrights for components of this work owned by others than 2. The challenges involved in designing a secure IoT are
ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- described in Section 3. We also describe how embedded and
publish, to post on servers or to redistribute to lists, requires prior specific permission hardware security approaches can be used to address these
and/or a fee. Request permissions from [email protected].
CyCAR’13, November 4, 2013, Berlin, Germany.
challenges. We conclude the paper in Section 4.
Copyright 2013 ACM 978-1-4503-2487-8/13/11 ...$15.00.
http://dx.doi.org/10.1145/2517968.2517976.
61
access points to access points to deliver a rich menu of ser-
Tier 4
Integration of IT Applications and Services vices such as saftey, traffic support, mobility and location
awareness, and support for real-time interactions. For in-
Federated Infrastructure
Tier 3
stance, a vehicle that is in the blind spot of another vehicle
(Compute, Storage, Network)
can sense a collision and communicate the alert the driver
to apply the brake. An STL may interact with other sen-
Tier 2
62
Physical quantity
Sensor Response bits
Tier 4
Challenge bits PUF
Integration of IT Applications and Services
Federated Infrastructure
the challenge. Sensor PUF produces the response based on
(Compute, Storage, Network)
the challenge as well as the sensed physical quantity.
Tier 2
Attack on
Attack on Gateway Fed. Infra. • For a given binary challenge, a PUF always produces
gateway Attack on the same response.
node
• One challenge-response pair leaks nothing about other
pairs.
Tier 1
63
Untrustworthy Table 1: NumChecker detection capabilities. The numbers
are deviations (%) from uninfected executions. Deviation of
more than 5% suggests a malicious modification. For each
App 1 App 2 App 3
rootkit, the bold number indicates the largest deviation [17].
64
Table 2: Summary of security challenges in IoT and corre- 5. REFERENCES
sponding hardware/embedded security support.
[1] Internet of Things - Architecture.
Hardware/Embedded
www.iot-a.eu/public, 2013.
Challenges Security Support [2] Aleph One. Smashing the stack for fun and profit.
Data Provenance and Integrity Sensor PUF Phrack magazine, 7(49):365, 1996.
Identity Management Sensor PUF, PUF [3] S. Babar, A. Stango, N. Prasad, J. Sen, and
Trust Management PUF, HPCs R. Prasad. Proposed embedded security framework for
Privacy Lightweight encryption internet of things (iot). In Wireless Communication,
Vehicular Technology, Information Theory and
Table 3: Recommendations on lightweight cryptographic Aerospace Electronic Systems Technology (Wireless
primitives to be used at each tier of IoT VITAE), 2011 2nd International Conference on, pages
1–5, 2011.
Sensor Node Gateway Fed. Infr. [4] M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized
Data < 10 B < 1 MB < 1 GB 1 GB trust management. In Security and Privacy, 1996.
size Proceedings., 1996 IEEE Symposium on, pages
Enc/Dec PRESENT CLEFIA AES RSA
mCRYPTON AES ECC
164–173. IEEE, 1996.
Hash DM-PRESENT PROP HMAC SHA-3 [5] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli. Fog
Key Ex. DH-512 DH-512 ECDH DH computing and its role in the internet of things. In
Digital ECDSA-163 ECDSA, DSA ECDSA Proceedings of the first edition of the MCC workshop
Sign. -233 409 on Mobile cloud computing, pages 13–16. ACM, 2012.
[6] D. Champagne and R. B. Lee. Scalable architectural
In short, sensor PUFs address the challenge of data prove- support for trusted software. In High Performance
nance and integrity. Sensor PUFs and PUFs can be used Computer Architecture (HPCA), 2010 IEEE 16th
for identity management; PUFs and hardware performance International Symposium on, pages 1–12. IEEE, 2010.
counters can be used for trust management. Lightweight [7] D. Chen, G. Chang, L. Jin, X. Ren, J. Li, and F. Li. A
encryption algorithms can support confidentiality and pri- novel secure architecture for the internet of things. In
vacy to users. Table 2 summarizes the challenges and hard- Genetic and Evolutionary Computing (ICGEC), 2011
ware/embedded security solutions. Fifth International Conference on, pages 311–314,
2011.
3.5 Other Security Requirements [8] M. Chui, M. LÃűffler, and R. Roberts. The Internet of
In addition to the challenges mentioned in Section 3, a A Things. McKinsey and Co. Quarterly Journal, 2010.
secure architecture must support confidentiality, integrity, [9] Cisco. The Internet of Things - How the Next
availability, authenticity, and non-repudiation; the IoT is Evolution of the Internet is Changing Everything,
no different. These are accomplished using cryptographic 2011.
primitives such as encryption algorithms, hash functions,
[10] Cisco Systems. Cisco 819 4G LTE M2M Gateway
digital signatures, and key exchange algorithms.
Integrated Service Router.
It is crucial to choose the appropriate cryptographic algo-
[11] J. Heitzeberg. Lively: Smart Sensors for Elderly Loved
rithm that does not consume too much power. For instance,
Ones, 2013.
if the amount of data to be processed is less than 1 KB, the
processing can be done on the sensor itself, else it can be sent [12] R. Roman, P. Najera, and J. Lopez. Securing the
to the node for processing. The node is capable of processing internet of things. Computer, 44(9):51–58, 2011.
data under 1 MB. The gateway and federated infrastructure [13] K. Rosenfeld, E. Gavas, and R. Karri. Sensor physical
can process data upto 1 GB and greater than 1 GB, respec- unclonable functions. In Hardware-Oriented Security
tively. By doing localized processing, data processing in tier and Trust (HOST), 2010 IEEE International
3 can be avoided. This localized processing results in faster Symposium on, pages 112–117. IEEE, 2010.
response times. Table 3 shows the cryptographic primitives [14] J. S. Shapiro, J. M. Smith, and D. J. Farber. EROS: A
that can be used at each tier of the IoT. Capability System. 1999.
[15] G. E. Suh and S. Devadas. Physical unclonable
4. CONCLUSION functions for device authentication and secret key
generation. In Proceedings of the 44th annual Design
We identified four key challenges in designing a secure
Automation Conference, pages 9–14. ACM, 2007.
IoT: data management, identity management, trust manage-
[16] The Economist. Care for the elderly: An age old
ment, and privacy. We describe how embedded and hard-
problem, 2011.
ware security approaches can be used to address these chal-
lenges in the context of an IoT. We propose the use of Sen- [17] X. Wang and R. Karri. Numchecker: Detecting kernel
sor PUFs to address the challenge of data provenance and control-flow modifying rootkits by using hardware
integrity. Sensor PUFs and PUFs can be used for identity performance counters. In Design Automation
management; PUFs and hardware performance counters can Conference (DAC), 2013 50th ACM / EDAC / IEEE,
be used for trust management. Lightweight encryption al- pages 1–7, 2013.
gorithms can be used to provide confidentiality and privacy [18] K. Xu, H. Xiong, C. Wu, D. Stefan, and D. Yao.
to the users. Data-provenance verification for secure hosts.
Dependable and Secure Computing, IEEE
Transactions on, 9(2):173–183, 2012.
65